IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 97  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ITE-ME, ITE-IST, BioX, SIP, MI, IE [detail] 2024-06-06
13:20
Niigata Nigata University (Ekinan-Campus "TOKIMATE") Enhanced Security with Random Binary Weights for Privacy-Preserving Federated Learning
Hiroto Sawada, Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (TMU)
(To be available after the conference date) [more]
RCC, ISEC, IT, WBS 2024-03-13
- 2024-03-14
Osaka Osaka Univ. (Suita Campus) Efficient Replay Data Selection in Continual Federated Learning Model
Yuto Kitano (Kobe Univ), Lihua Wang (NICT), Seiichi Ozawa (Kobe Univ) IT2023-96 ISEC2023-95 WBS2023-84 RCC2023-78
In this study, we propose a continual federated learning that can continuously learn distributed data generated daily by... [more] IT2023-96 ISEC2023-95 WBS2023-84 RCC2023-78
pp.135-141
CNR, BioX 2024-02-29
15:00
Tokyo NHK Science & Technology Research Laboratories
(Primary: On-site, Secondary: Online)
Implementation and Evaluation of Privacy-Preserving Image Transformation Methods for Person Re-identification
Junpei Yamaguchi, Hajime Nada, Yumo Ouchi, Narishige Abe (Fujitsu) BioX2023-73 CNR2023-40
Advances in machine learning have enabled high-accuracy tracking of individuals using surveillance cameras, making the d... [more] BioX2023-73 CNR2023-40
pp.18-23
SIP, SP, EA, IPSJ-SLP [detail] 2024-02-29
17:20
Okinawa
(Primary: On-site, Secondary: Online)
An Enhanced Privacy-Preserving Scheme for Federated Learning of Vision Transformer without Model Performance Degradation
Rei Aso, Sayaka Shiota, Hitoshi Kiya (Tokyo Metropolitan Univ.) EA2023-80 SIP2023-127 SP2023-62
Federated learning is a learning method for training models over multiple participants without directly sharing their ra... [more] EA2023-80 SIP2023-127 SP2023-62
pp.115-120
SIP, SP, EA, IPSJ-SLP [detail] 2024-02-29
15:10
Okinawa
(Primary: On-site, Secondary: Online)
Byzantine attack detection via similarity of local updates in federated learning
Kenta Ohno, Masao Yamagishi (Hosei Univ.) EA2023-86 SIP2023-133 SP2023-68
We propose a method to detect Byzantine attacks in federated learning, as well as a method for identifying clients repea... [more] EA2023-86 SIP2023-133 SP2023-68
pp.150-155
NS, IN
(Joint)
2024-02-29
10:45
Okinawa Okinawa Convention Center A privacy protection mechanism using Bloom Filter for a P2P-based tracking system watching over children
Yuki Matsumoto, Akihiro Fujimoto (Wakayama Univ), Hideki Tode (Osaka Metropolitan Univ) NS2023-193
With the increase in the number of single-parent and elderly-only families, as well as changes in work patterns such as ... [more] NS2023-193
pp.125-130
EMM 2024-01-16
15:25
Miyagi Tohoku Univ.
(Primary: On-site, Secondary: Online)
[Invited Talk] Federated Learning with Enhanced Privacy Protection in AI
Lihua Wang (NICT) EMM2023-83
Federated learning is a crucial methodology in artificial intelligence where multiple organizations collaborate to perfo... [more] EMM2023-83
p.19
MSS, CAS, IPSJ-AL [detail] 2023-11-16
13:20
Okinawa   On Speed Response and Disclosed Subspace of Privacy-Preserving Vehicle Platoon Speed Control
Takeshi Hyodo, Kenji Sawada (UEC) CAS2023-62 MSS2023-32
There is a growing demand for cyber security measures in vehicle platoon control. In order to prevent malicious vehicles... [more] CAS2023-62 MSS2023-32
pp.13-18
RISING
(3rd)
2023-10-31
10:45
Hokkaido Kaderu 2・7 (Sapporo) [Poster Presentation] Performance Analysis of Cognitive Radio Networks With Location Privacy Preservation
Ryutaro Kobuchi (Osaka Univ.), Tatsuaki Kimura (Doshisha Univ.), Tetsuya Takine (Osaka Univ.)
With the rapid increase in demand for wireless communication services, dynamic spectrum sharing in cognitive radio netwo... [more]
IA 2023-09-21
13:50
Hokkaido Hokkaido Univeristy
(Primary: On-site, Secondary: Online)
A consideration about a discovering method of privacy-enhanced authoritative DNS servers
Satoru Sunahara (CIST), Yong Jin (Tokyo Tech), Katsuyoshi Iida (HU) IA2023-11
Plain-text communication of DNS queries poses a risk of privacy leakage. Therefore, it is imperative to achieve protecti... [more] IA2023-11
pp.1-5
SIP 2023-08-07
12:50
Osaka Osaka Univ. (Suita) Convention Center
(Primary: On-site, Secondary: Online)
An Extension of Image Encryption for Vision Transformer Considering Privacy Protection
Haiwei Lin, Shoko Imaizumi (Chiba Univ.), Kiya Hitoshi (Tokyo Metropolitan Univ) SIP2023-46
In this paper, we propose an extended framework of access control for Vision Transformer (ViT).
The previous study acc... [more]
SIP2023-46
pp.1-6
EMM 2023-03-02
13:00
Nagasaki Fukue culture hall
(Primary: On-site, Secondary: Online)
[Poster Presentation] Improvement of human flow measurement using flor estimation on depth images
Takuya Nagatoshi, Michiharu Niimi (KIT) EMM2022-74
Measuring human flow to determine the number of people and flow lines in a space is a useful decision-making tool when c... [more] EMM2022-74
pp.38-43
IN, NS
(Joint)
2023-03-03
10:10
Okinawa Okinawa Convention Centre + Online
(Primary: On-site, Secondary: Online)
Access Control Method with Privacy Preservation in NDN
Yuma Fukagawa, Noriaki Kamiyama (Ritsumeikan Univ.) NS2022-221
Information-Centric Networking (ICN), which transfers Interest by the name of content without using name resolution and ... [more] NS2022-221
pp.310-315
EMM 2023-03-02
16:00
Nagasaki Fukue culture hall
(Primary: On-site, Secondary: Online)
[Invited Talk] Image transformation with random numbers for reliable AI
Hitoshi Kiya (TMU) EMM2022-87
The combined use of deep neural networks (DNNs) and images transformed with random sequences has given a new insight for... [more] EMM2022-87
pp.107-109
NS, ICM, CQ, NV
(Joint)
2022-11-25
13:00
Fukuoka Humanities and Social Sciences Center, Fukuoka Univ. + Online
(Primary: On-site, Secondary: Online)
[Invited Talk] Continual Learning for Privacy Protection and Data Leakage Prevention
Takashi Shibata (NTT) NS2022-123 CQ2022-56 ICM2022-26
Continuous learning aims to train a highly expressive model for a new task while retaining all knowledge about previous ... [more] NS2022-123 CQ2022-56 ICM2022-26
pp.131-132(NS), pp.52-53(CQ), pp.25-26(ICM)
EA, EMM, ASJ-H 2022-11-21
10:00
Online Online [Poster Presentation] ConvMixer model transformation using random orthogonal matrices for privacy protection of test images.
Rei Aso, Tatsuya Chuman, Hitoshi Kiya (TMU) EA2022-49 EMM2022-49
In this paper, a privacy preserving image classification method is proposed under the use of ConvMixer models. To protec... [more] EA2022-49 EMM2022-49
pp.46-51
ISEC, SITE, LOIS 2022-11-18
16:20
Online Online Decentralization of Revocation Process Using Intermediate Servers in Revocable Group Signatures
Kai Kimura, Toru Nakanishi, Teruaki Kitasuka (Hiroshima Univ.) ISEC2022-41 SITE2022-45 LOIS2022-25
A group signature is a signature method that allows a user who belongs to a group to prove that he or she ”belongs to th... [more] ISEC2022-41 SITE2022-45 LOIS2022-25
pp.66-72
IA, CQ, MIKA
(Joint)
2022-09-15
13:50
Hokkaido Hokkaido Citizens Actives Center
(Primary: On-site, Secondary: Online)
Secure outsourcing data integrity auditing for Internet of Things in cloud-edge environment
Yangfei Lin, Celimuge Wu, Tsutomu Yoshinaga (UEC) CQ2022-30
The number of IoT devices has expanded greatly last few years. Given the feature of limited computing and storage resour... [more] CQ2022-30
pp.42-47
CQ, CS
(Joint)
2022-05-12
14:20
Fukui Fukui (Fuku Pref.)
(Primary: On-site, Secondary: Online)
Distributed Network Intrusion Detection System Using Federated Learning
Yuya Tsuru, Tomoya Kawakami, Tatsuhito Hasegawa (Univ. of Fukui) CQ2022-5
A network-based intrusion detection system (NIDS) monitors a network and detects unauthorized traffic. Currently, a vari... [more] CQ2022-5
pp.20-25
MSS, NLP 2022-03-29
15:45
Online Online Proposal of work end time estimation technology using PC operation logs
Rina Yamamoto, Yoshiyuki Sakamaki, Tadanobu Tsunoda, Junpei Yamaguchi, Hisashi Kojima (Fujitsu Ltd.) MSS2021-80 NLP2021-151
In conventional working style in offices, employees communicated each other in break time of work. However, it’s difficu... [more] MSS2021-80 NLP2021-151
pp.133-138
 Results 1 - 20 of 97  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan